Preview

Cis 102 Assignment Security System

Satisfactory Essays
Open Document
Open Document
382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cis 102 Assignment Security System
Computers benefit from having an all-in-one computer security system in different ways depending one which system you install to your computer. All-in-one computer security systems are programs that keep not only your computer safe but all of your personal information. Many of the all-in-one computer systems, such as Nortons or AVG, protect the user with their personal stuff by securing all user names and passwords. They also clean computers from virus’, spy-ware, Trojan horses, worms, bots and rootkits. These are all things that can compromise your personal information and could cause the computer user to loose a large amount of information once their computer freezes. Usually the only way clean a computer when this happens is wiping everything off the computer and starting over. No user wants to go through this. I have personally had this happen three or four times due to getting virus’ that took over the computer. Now, I prevent that all from happening again. Not only do these security systems prevent the virus’ of all sorts but it also prevents spyware. Spyware is how hackers are able to get all of your personal information to use at their own disposal. Many of the security devices do live checks on the websites that you are visiting or try to visit to make sure that they are safe and real sites. If the site is a joke or dangerous to your computer it will not allow you to visit that site or will warn you before you continue on. Having a security system such as Nortons and AVG allows the user to download and share files without worrying about contracting a virus from the person/program they are downloading from. The best thing for to me that security systems offer is the firewall. The firewall prevents live attacks on your computer while you are on it. I have had Nortons block several attacks to my computer. The only thing that is a downfall to computer security systems is that they can cost quite a bit depending on which you get and what all they cover. To

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Now regarding your dilemma with deciding over buying hardware firewalls and antivirus applications… stop. There is no need to go and shill extra money to buy hardware for any sort of countermeasures, no matter how noble your goals may seem. Windows 7 already has user-friendly security, so discrepancies such as viruses and spyware will be dealt with more efficiently. The Action Center in your Control Panel will make sure your Firewall is on, and BitLock Drive Encryption makes sure your passwords,…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    My firewall may be effective at blocking some attacks and offering a certain amount of protection. But a firewall does not guarantee that your computer will be attacked. In particular, a firewall offers little to no protection against viruses. However using a firewall in conjunction with other protective software and safe practices will strengthen resistance to attacks. Anti-virus software details vary between packages but basically it scans files on your computer’s memory for certain patterns that may indicate an infection, looking for signatures, or definitions, of known viruses. Authors for viruses are continually being updated and released, so it’s important you have the latest definitions installed so the software can tackle any threat new or old. Each virus software has its own method of response once it locates a virus, and the action may vary according to when it finds the virus either during an automatic or a manual scan. Most software produces a dialog box alerting you if it has found a virus and asks whether you want it to clean the file or remove it. Some software may attempt to remove the virus without first asking. A good user should familiarize themselves with the features so they know how to handle such a…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Anti-malware can protect the computer from harmful software and this therefore speeds up the PC as harmful software can also slow down the PC. Many anti-malware software comes with other features that can speed up the PC…

    • 1180 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Companies should download or purchase an anti virus software on their computers so that it will prevent hackers or third parties gaining access to their data.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    [242.1] Select and use appropriate methods to minimise security risk to IT systems and data…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Epic is privately held health care software company. In 1979, it was established by Judith Faulkner. The organization central command was in Madison, Wisconsin, yet in 2005 the organization moved to Vernon, Wisconsin. The product 's business is health awareness associations, and it is a fascinating suite of human services programming fixated on a MUMPS database. (Massachusetts General Hospital Utility Multiple Programming System). It is a programming dialect that was made in the 1960 and afterward utilized for the health awareness associations.…

    • 799 Words
    • 3 Pages
    Good Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Starting with the first action, installing firewalls and anti-virus, the article "Firewalls" goes in-depth about how these are important here "While firewalls filter and limit incoming transmission of data that tries to access the system, anti-virus software looks at how the data affects your system". This shows why it's critical to have both a firewall and anti-virus software installed. If you install only a firewall then as soon as its been breached, whoever invaded your system has access to all of your files and personal info with no anti-virus to stop them. It's the same for firewalls, if you are without one, the virus can access your device much easier than a device with both anti-virus and a firewall installed. It's very important to have both installed for maximum security to deter hackers, scammers, and spy…

    • 601 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Second, internet filters also have other advantages. First, filter software can protect the data of businesses; companies also need to protect customer information to keep it from falling in the wrong hands. Second, filter software can identify internet theft is a real threat, because hackers are skilled at getting people's personal information and using it to commit fraud. Third, filter software can make the employees more productive, because there are employees who spend many working hours surfing websites unrelated to their jobs.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Digital Forensics Paper

    • 1687 Words
    • 7 Pages

    One process I like to use it computer recovery or restore to a certain point or day, it keeps most of your files in tack, but it can restore all files that were deleted or corrupted by a virus or a malware attack. There is also a system backup, whereas the administrator can do a complete system restore, and bring the system back to a certain date and time in order to recover the file that you needed, and bring the system back on line and up to date.…

    • 1687 Words
    • 7 Pages
    Good Essays

Related Topics